Heng Zhang
Orcid: 0000-0002-4201-3892Affiliations:
- Jiangsu Ocean University, School of Science, Jiangsu, China
- Huaihai Institute of Technology, Lianyungang, China
- Zhejiang University, College of Control Science and Engineering, Hangzhou, China (PhD 2015)
According to our database1,
Heng Zhang
authored at least 86 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Signal Process., 2025
2024
Stealthy Black-Box Attack With Dynamic Threshold Against MARL-Based Traffic Signal Control System.
IEEE Trans. Ind. Informatics, October, 2024
Transferable Adversarial Attack Against Deep Reinforcement Learning-Based Smart Grid Dynamic Pricing System.
IEEE Trans. Ind. Informatics, June, 2024
Promoting or Hindering: Stealthy Black-Box Attacks Against DRL-Based Traffic Signal Control.
IEEE Internet Things J., February, 2024
IEEE Trans. Smart Grid, January, 2024
Privacy-Preserving Collaborative Learning: A Scheme Providing Heterogeneous Protection.
IEEE Internet Things J., January, 2024
A fully automatic adjacent key-points localization framework for minimal repeated pattern detection in printed fabric images.
Knowl. Based Syst., 2024
CoRR, 2024
Comput. Electr. Eng., 2024
Joint multi-subspace feature learning with singular value decomposition for robust single-sample face recognition.
Comput. Electr. Eng., 2024
Finite-Time Attitude Consensus Tracking Control of Multiple Spacecraft Systems With Input Quantization and Actuator Faults.
IEEE Access, 2024
Maximizing Secrecy Rate in Dual USVs System for Secure Underwater Wireless Communication with Unknown Eavesdropper.
Proceedings of the 7th IEEE International Conference on Industrial Cyber-Physical Systems, 2024
2023
IEEE Trans. Syst. Man Cybern. Syst., December, 2023
IEEE Trans. Circuits Syst. II Express Briefs, November, 2023
Achieving Physical Layer Security Against Location Unknown Eavesdroppers via Friendly Jammer.
IEEE CAA J. Autom. Sinica, October, 2023
An Improved grey wolf optimizer with weighting functions and its application to Unmanned Aerial Vehicles path planning.
Comput. Electr. Eng., October, 2023
Resilient Distributed Classification Learning Against Label Flipping Attack: An ADMM-Based Approach.
IEEE Internet Things J., September, 2023
Backdoor attacks against deep reinforcement learning based traffic signal control systems.
Peer Peer Netw. Appl., January, 2023
Fixed-Time Consensus for Multiple Mechanical Systems With Input Dead-Zone and Quantization Under Directed Graphs.
IEEE Trans. Netw. Sci. Eng., 2023
A Labeled RFS-Based Framework for Multiple Integrity Attackers Detection and Identification in Cyber-Physical Systems.
IEEE Internet Things J., 2023
Leveraging UAV-RIS Reflects to Improve the Security Performance of Wireless Network Systems.
IEEE Netw. Lett., 2023
Maximizing Throughput in Unmanned Surface Vehicle Relay System under Jamming Attacks.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
2022
Joint Reflectance Field Estimation and Sparse Representation for Face Image Illumination Preprocessing and Recognition.
Neural Process. Lett., 2022
Internet Technol. Lett., 2022
Comput. Electr. Eng., 2022
Model-free predictive control of nonlinear systems under False Data Injection attacks.
Comput. Electr. Eng., 2022
Comput. Electr. Eng., 2022
Security analysis and defense strategy of distributed filtering under false data injection attacks.
Autom., 2022
Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation.
Autom., 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the 13th Asian Control Conference, 2022
Proceedings of the 13th Asian Control Conference, 2022
2021
Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping.
IEEE Trans. Ind. Informatics, 2021
Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper.
Inf. Sci., 2021
Comput. Electr. Eng., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the 2021 International Conference on Security, 2021
Improving Security Performance of Dual UAVs System with Unknown Eavesdropper Location: Poster Abstract.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
2020
Optimal Attack Strategy Against Wireless Networked Control Systems With Proactive Channel Hopping.
IEEE Trans. Ind. Informatics, 2020
Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Cybern., 2020
IEEE Trans. Autom. Control., 2020
Peer-to-Peer Netw. Appl., 2020
Frontiers Inf. Technol. Electron. Eng., 2020
Poster Abstract: Iterative Trajectory Optimization for Dual-UAV Secure Communications.
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020
Proceedings of the 11th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2020
2019
Distributed Load Sharing Under False Data Injection Attack in an Inverter-Based Microgrid.
IEEE Trans. Ind. Electron., 2019
Guest editorial: Networked cyber-physical systems: Optimization theory and applications.
Peer-to-Peer Netw. Appl., 2019
Set-valued Kalman filtering: Event triggered communication with quantized measurements.
Peer-to-Peer Netw. Appl., 2019
Eur. J. Control, 2019
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2019
Trajectory Tracking for Autonomous Underwater Vehicle Based on Model-Free Predictive Control.
Proceedings of the 20th IEEE International Conference on High Performance Switching and Routing, 2019
Analysis on Attack Schedules in Wireless Networked Control Systems based on Channel Hopping.
Proceedings of the 12th Asian Control Conference, 2019
Optimization-Based Unknown Input Observer for Road Profile Estimation with Experimental Validation on a Suspension Station.
Proceedings of the 2019 American Control Conference, 2019
2018
A Novel Data Fusion Algorithm to Combat False Data Injection Attacks in Networked Radar Systems.
IEEE Trans. Signal Inf. Process. over Networks, 2018
Sensor transmission power control in remote state estimation over a fading communication channel.
Trans. Inst. Meas. Control, 2018
IEEE Trans. Control. Netw. Syst., 2018
Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel.
IEEE Trans. Autom. Control., 2018
Robust Transmission Power Management for Remote State Estimation With Wireless Energy Harvesting.
IEEE Internet Things J., 2018
Optimum transmission policy for remote state estimation with opportunistic energy harvesting.
Comput. Networks, 2018
Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, SenSys 2018, 2018
Proceedings of the 15th International Symposium on Pervasive Systems, 2018
Distributed Asymptotically Synchronization Control for MIMO Nonlinear Multiagent Systems.
Proceedings of the 15th International Symposium on Pervasive Systems, 2018
2017
Peer-to-Peer Netw. Appl., 2017
Ad Hoc Networks, 2017
Filtering for networked switched systems with multiple redundant channels: An application to the boost-buck converter.
Proceedings of the 13th IEEE International Conference on Control & Automation, 2017
Proceedings of the 11th Asian Control Conference, 2017
Proceedings of the 2017 American Control Conference, 2017
2016
IEEE Trans. Control. Syst. Technol., 2016
A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop.
Sensors, 2016
Secur. Commun. Networks, 2016
Proceedings of the IEEE Congress on Evolutionary Computation, 2016
2015
IEEE Trans. Autom. Control., 2015
Int. J. Distributed Sens. Networks, 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
2014
ACM Trans. Sens. Networks, 2014
Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control.
Proceedings of the American Control Conference, 2014
2013
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013